NEW QUESTION 281Which address block is reserved for locally assigned unique local addresses?

A. 2002::/16B. FD00::/8C. 2001::/32D. FB00::/8

Answer: B

NEW QUESTION 282What is a possible reason for the error message?Router(config)#aaa server?% Unrecognized command

A. The command syntax requires a space after the word “server”B. The command is invalid on the target deviceC. The router is already running the latest operating systemD. The router is a new device on which the aaa new-model command must be applied before continuing

Answer: D

NEW QUESTION 283Which statements about smart tunnels on a Cisco firewall are true? (Choose two.)

A. Smart tunnels can be used by clients that do not have administrator privilegesB. Smart tunnels support all operating systemsC. Smart tunnels offer better performance than port forwardingD. Smart tunnels require the client to have the application installed locally

Answer: ADExplanation:Smart Tunnel is also used to provide remote access to web applications that are difficult to rewrite, such as proprietary, non-standards-based Java, Java Script, or Flash animations. Smart Tunnel also supports Single Sign-On to web applications that require either form-based POST parameters, http basic, FTP, or NTLM authenticationSmart Tunnel can also co-exist with a Full-Tunnel VPN Client. For example, an employee can connect to the company network by using Full-Tunnel VPN Client, while simultaneously connecting to a vendor network by using Smart Tunnel.Smart Tunnel Advantages over Port-Forwarding, Plug-insSmart Tunnel offers better performance than browser plug-ins.Port forwarding is the legacy technology for supporting TCP-based applications over a Clientless SSL VPN connection. Unlike port forwarding, Smart Tunnel simplifies the user experience by not requiring the user connection of the local application to the local port.Smart Tunnel does not require users to have administrator privileges.Smart Tunnel does not require the administrator to know application port numbers in advance.

NEW QUESTION 284Which option describes information that must be considered when you apply an access list to a physical interface?

A. Protocol used for filteringB. Direction of the access classC. Direction of the access groupD. Direction of the access list

Answer: C

NEW QUESTION 285Which source port does IKE use when NAT has been detected between two VPN gateways?

A. TCP 4500B. TCP 500C. UDP 4500D. UDP 500

Answer: C

NEW QUESTION 286Which of the following are features of IPsec transport mode? (Choose three.)

Answer: ADEExplanation:IPSec Transport ModeIPSec Transport mode is used for end-to-end communications, for example, for communication between a client and a server or between a workstation and a gateway (if the gateway is being treated as a host). A good example would be an encrypted Telnet or Remote Desktop session from a workstation to a server.Transport mode provides the protection of our data, also known as IP Payload, and consists of TCP/UDP header + Data, through an AH or ESP header. The payload is encapsulated by the IPSec headers and trailers. The original IP headers remain intact, except that the IP protocol field is changed to ESP (50) or AH (51), and the original protocol value is saved in the IPsec trailer to be restored when the packet is decrypted.IPSec transport mode is usually used when another tunneling protocol (like GRE) is used to first encapsulate the IP data packet, then IPSec is used to protect the GRE tunnel packets. IPSec protects the GRE tunnel traffic in transport mode.